Real-time network simulation refers to simulating computer networks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications....
详细信息
Internetwares [1] are a new type of software oriented to Internet. How to guarantee the QoS (Quality of Service) of Internetwares in highly open Internet is a challenge problem. This problem is especially important fo...
详细信息
ISBN:
(纸本)9781605588728
Internetwares [1] are a new type of software oriented to Internet. How to guarantee the QoS (Quality of Service) of Internetwares in highly open Internet is a challenge problem. This problem is especially important for e-commerce applications, because the users of e-commerce business are sensitive to QoS, such as the accessibility and responsiveness, and consequently the QoS of e-commerce applications are vital to their successes. Therefore, it is critical to evaluate and optimize the QoS of an e-commerce site by benchmarks off-line. Copyright 2009 ACM.
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ...
详细信息
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building System to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization.
Gabor feature based classification approaches are widely used in face recognition, because they are insensitive to changes in illumination and facial expression. However, most of strategies only use the magnitude of t...
详细信息
Traditional access control solutions suffer from difficulties in access rights authorization and usage policy enforcement, especially in highly distributed environments. The layered nature of common digital content sh...
详细信息
Combined with human visual characteristics and morphological watershed algorithm, a novel image processing method was proposed for automatic region of interest (ROI) extraction. The color image would be converted into...
详细信息
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p...
详细信息
A new SIP signaling compression solution based on structured dynamic dictionary is proposed in this paper. A SIP compression mechanism based on dynamic-dictionary is designed for improving SIP signaling compression co...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
An extend vulnerability testing method for communication protocol is brought forward first, which is combined protocol Syntax analysis with Petri Net system. Then vulnerability testing of implementation of WAP protoco...
详细信息
暂无评论